0% found this document useful (0 votes)
71 views10 pages

GCE 2017 p1

The document contains a series of multiple-choice questions covering various topics in computer science and information technology. It addresses concepts such as electronic learning, project management, algorithms, data integrity, and software types. Each question presents four options, from which the correct answer must be selected.

Uploaded by

mangabassa510
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views10 pages

GCE 2017 p1

The document contains a series of multiple-choice questions covering various topics in computer science and information technology. It addresses concepts such as electronic learning, project management, algorithms, data integrity, and software types. Each question presents four options, from which the correct answer must be selected.

Uploaded by

mangabassa510
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

A study method in which the user receives study material and

takes examination online is known as:


A. electronic mailing.
B. computer aided learning.
C. videoconferencing.
D. electronic learning.
A graphical representation of an algorithm is known as:
A. pseudocode.
B. logic structure.
C. flow chart.
D. Flow diagram.
The paradigm in which the programmer designs programs by
outlining steps to be followed to solve a problem is called:
A. top-down programming.
B. procedural programming.
C. stepwise programming.
D. object-oriented programming.
At which stage of project management is it possible for a decision
to be taken to cancel the project?
A. Initiation.
B. Planning.
C. Implementation.
D. Termination.
Which of the following is not a project management constraint?
A. Critical path.
B. Time.
C. Cost.
D. Scope.
Which communications technique transmits many signals
simultaneously over a single channel?
A. Duplexing.
B. Half duplexing.
C. Channeling.
D. Multiplexing.
What is the output of the algorithm below?
Set i to 1
Set total to 1
Do steps 4 and 5 until i > 3
total = total * i
i=i+1
Output: total
A. 24
B. 20
C. 3
D. 15
The two activities of the machine cycle that take place in the
control unit are:
A. Decode-execute.
B. Fetch-decode.
C. Decode-store.
D. Execute-store.
The memory location with the fastest access rate is:
A. ROM.
B. RAM.
C. Register.
D. Cache.
The resolution of the print out of a printer is measured in:
A. Pages per minute.
B. Dots per inch.
C. Pixels density.
D. Dot pitch.
Which of the following provides a mechanism that can be used to
convert scanned text into editable text?
A. OCR.
B. MICR.
C. OMR.
D. Digitizer.
A document that states in writing how a company plans to protect
its physical and data assets.
A. Data protection act.
B. Copyright.
C. Data dictionary.
D. Security policy.
What type of backup should be performed prior to an upgrade?
A. Differential.
B. Sequential.
C. Procedure.
D. Full.
Which of the following is NOT a function of the operating system?
A. Deciding which instructions stay in the RAM.
B. Program interaction.
C. Decode instructions in a computer.
D. Making hardware ready for application use.
The integrity of data can be assured by:
A. Creating several backups of the same data.
B. Data verification.
C. Proper antivirus protection.
D. Use of passwords.
Which of the following can be used to describe the term spooling?
A. A queue of data in a computer for printing.
B. Input information into the printer online.
C. Simultaneous processing and storage online.
D. None.
A field in a database table which appears as a primary key in
another database table is called a:
A. candidate key.
B. secondary key.
C. foreign key.
D. primary key.
The process of determining whether someone is, in fact, who he/
she is declared to be is:
A. authentication.
B. identification.
C. confidentiality.
D. privacy.
The type of software that reduces file size in storage without
affecting the content of the file is:
A. trojan.
B. defragmenter.
C. driver software.
D. utility software.
Which of the following is a data security measure that can be used
to prevent external threat in a network?
A. Use of firewall.
B. defragmenter.
C. Biometric Systems.
D. Debugging software.
Which of the following statements is NOT true about a primary
key?
A. It does not contain a blank value.
B. It is a unique identifier of records.
C. It is always in text form.
D. It should be the first field in a table.
Concerning e-banking, what is the advantage of ATM to a banker?
A. To withdraw money at any time.
B. Serve many people at a time.
C. Control the amount of money paid to customers.
D. To save customers time.
To do research, buy and sell stocks online is known as:
A. e-banking.
B. e-marketing.
C. e-commerce.
D. e-trading.
A programmer who requires solving a problem that makes logical
decision based on a condition would use ______ control structure.
A. sequence.
B. Selection.
C. Repetitive.
D. iterative.
A protocol which enable the functioning of global network of
computers is:
A. FTP.
B. Internet Protocol.
C. HTTP.
D. TCP/IP.
A company writes a computer program to carry out a specific job.
This type of program is called:
A. custom software.
B. off-the-shelf software.
C. general-purpose software.
D. special-purpose software.
A spreadsheet formula is given as =SUM(A1:D2). Two cell
addresses involve in the formula are:
A. B2 and C1.
B. A3 and B2.
C. A2 and B3.
D. B3 and D1.
A system of programs and data structures that approximates the
operation of the human brain is:
A. embedded system.
B. modelling and simulation.
C. genetic programming.
D. artificial intelligence.
Which of the following memories is found in the CPU?
A. RAM.
B. BIOS.
C. ROM.
D. Register.
What is true about mobile networks is that they:
A. cannot be intercepted.
B. are not accessible everywhere.
C. are available only on mobile phones.
D. cannot be intercepted by walls.
A huge collection of electronic pages containing information about
many different subjects is called:
A. Google.
B. facebook.
C. world wide web.
D. search engine.
Uploading or downloading data to or from a remote computer on
the Internet is done by:
A. FTP.
B. SMTP.
C. POP.
D. TCP/IP.
Teleworking is getting normal office work done by working:
A. from a telephone company.
B. away from the office.
C. online out of the office.
D. Internet while in the office.
At which stage of a SDLC do we check and modify the system to
ensure that it continues to meet changing business need?
A. System investigation.
B. System design.
C. System analysis.
D. System maintenance and review.
Which of the following is an activity in the implementation phase
of a new system?
A. Determining test items.
B. Training of users.
C. Writing algorithms.
D. Writing codes.
The order of execution of instructions in high level programming
language is determined by:
A. Sequence.
B. Syntax.
C. Semantics.
D. Control structure.
The method used by organization to completely do away with the
old system to use a new system is known as ______
implementation.
A. direct.
B. parallel.
C. Phased.
D. Complete.
Software that can convert codes written by programmers in high
level languages into machine code is:
A. compiler.
B. assembler.
C. decoder.
D. operating system.
A milestone in project management indicates the:
A. completion of the first stage of the project.
B. passing of 50% of the time allocated to the project.
C. completion of an important stage of a project.
D. conclusion of a stage of a project with a zero time lag.
When a program fails to compile because a statement separator
such as a semicolon is missing in the program, this type of error is
known as a:
A. lexical error.
B. syntax error.
C. logic error.
D. semantic error.
A program that provides a way to look at and interact with the
information on the World Wide Web is a:
A. HTML editor.
B. search engine.
C. browser.
D. web crawler.
A term used to describe the process of discovering patterns in
data that can lead to predictions about the future:
A. data mining.
B. verification.
C. Normalization.
D. data processing.
The software that enables the operating system to recognize a
newly connected device is known as:
A. utility software.
B. a driver.
C. an interpreter.
D. a device manager.
______ generation digital electronic computers use ______ for the
design of its electronic circuits.
A. Transistors.
B. logic gates.
C. vacuum tubes.
D. integrated circuits.
Which of the following is NOT a system software?
A. File manager.
B. Anti-virus software.
C. Productivity software.
D. File compression software.
A transaction processing system is concerned with:
A. the operational day-to-day activities.
B. the strategic decision-making support.
C. a large database of specialised knowledge.
D. daily update of database.
A finance system that predicts future business situation is an
example of a:
A. predictive system.
B. executive support system.
C. knowledge based system.
D. management information system.
A method of processing that cumulates data to process it after a
period of time is called ______ processing.
A. batch.
B. Online.
C. distributed.
D. periodic.
Which of the following is not a benefit of ICT in business today?
A. Accurate results.
B. Size of business.
C. Instant response.
D. Speed of processing.
The word size of a computer processor refers to the:
A. number of instructions processed at a time.
B. number of bits the CPU can process simultaneously.
C. number of characters it can allow in the database field.
D. maximum number of words that can stay in the RAM for
processing.

You might also like